• Tidak ada hasil yang ditemukan

Modul 1 Intro To Net Admin

N/A
N/A
Protected

Academic year: 2017

Membagikan "Modul 1 Intro To Net Admin"

Copied!
10
0
0

Teks penuh

(1)

Mata Kuliah

Mata Kuliah

Mata Kuliah

Mata Kuliah

Mata Kuliah

Mata Kuliah

Mata Kuliah

Mata Kuliah

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Administrasi Jaringan

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

Politeknik Elektronikan Negeri Surabaya

(2)
(3)

!

!

"

#

$ %

&

"

#

$ %

&

(4)

INTERNET

FIREWALL ROUTER -GTW

DMZ

PROXY (Squid ) All access to Internet must through Proxy

FIREWALL -IDS Linux bridge , iptables shorewall , snort , portsentry , acidlab CISCO Router

Using acl , block malware from outside

All Server in DMZ Manage using SSH , Secure Webmin

SQL Database (MySQL ) Access only from localhost (127.0.0.1)

Managable Switchs

Block unwanted user from port , manage from WEB

(

(

MULTILAYER

SWITCH E-MAIL %# $ ' )#$ # % ( % # #* FILESERVER EIS %# $ ' )#$ # % ( % # #* WWW DOMAIN Traffic Monitoring CACTI

Http://noc .eepis -its.edu

EEPISHOTSPOT

PROXY

LECTURER

,

EMPLOYEE

STUDENTS Internal ServerEEPIS -INFORMATION SYSTEM

(EIS http ://eis.eepis -its.edu ) Http://fileserver .eepis -its .edu E-Mail server

HTTPS , SPAM (Spamassassin ), Virus Scanner (ClamAV )

L3 Switch Block malware on physical port from inside network

(5)

+%

,

$

+%

,

$

► ►

- #$

- #$

%

%

, $ . $ # % / #$ ' , $ . $ # % / #$ ' % #$ % ' % #$ % ' % , 0! -1

% , 0! -122,30,30 ( ! 0( ! 0 !! '' .. $ ! # ! ( $ ! # ! ( % % ► ►

%

%

- % #$ % ' - % #$ % ' $ ' $ ' $ ' $ ' - . % % ' - . % % ' ►

► 44 .. ► ► ► ► .... .. ► ►

#

#

#

#

0 % 5. ( 6! % #$ % % . 0 % 5. ( 6! % #$ % % .

( ' ( '

$ # $ . %

$ # $ . %

''

(6)

#

9

#

9

User

User

••

How many users are there?How many users are there?

The level of the user's expertise.

What are the users trying to do?

Are they responsible or irresponsible?

Who do the users know?

Hardware

Hardware Software

Software

••

How many, how big and how complex?How many, how big and how complex?

Is there a network?
(7)

#

9

#

9

What

What System

System Administrator

Administrator Do

Do ?

?

Conflict

Conflict

••

ensuring that the computing system runs correctly and as efficiently as ensuring that the computing system runs correctly and as efficiently as possible, and

possible, and

ensuring that all users can and do use the computing system to carry out their required work in the easiest and most efficient manner

••

Management will wish to restrict the amount of money spent on computer Management will wish to restrict the amount of money spent on computer

••

Management will wish to restrict the amount of money spent on computer Management will wish to restrict the amount of money spent on computer systems.

systems.

••

The users on the other hand will always want more disk space and faster The users on the other hand will always want more disk space and faster CPUs.

CPUs.

••

The System Administrator must attempt to balance these two conflicting The System Administrator must attempt to balance these two conflicting aims
(8)

#

(

#

(

:

:

0

0

#

#

(

(

#

#

#

#

-

-

.

.

0

0

#

#

$ . #

$ . #

#

#

#

#

%

%

#

#

#

#

%

%

#

#

#

#

► ►

► ►

0

0

#

#

$

$

0

0

$

$

(9)

+%

#

#

+%

#

#

$

$

##

##

!

!

# # % ( $ #' % # % # # % ( $ #' % # % % ( $ % # ; 4 % ( $ % # ; 4 $ # % $ $ . # '

$ # % $ $ . # '

%

%

#

#

!

!

% # . # % % # . # % % %

% %

''

#

#

!

!

#

#

!

!

9 #

9 #

- #$

- #$

.

.

!

!

#$

#$

##

##

!

!

!!

$ #

$ #

!

!

!!

(

(

!

!

#

#

#

#

$

$

!

!

(10)

0

#

<

0

#

<

► << ## ## ►

► 19-19- ( !( ! 88 $$ $$

► %% :: !! 88 $$ $$

► 1 #1 # -- !! 88 $$ $$

► , #, # (( !! 88 $$ $$

► !! == %% ((

► 11 !! 88 $$ $$

► 11 !! 88 $$ $$

► ++ (( !! 88 $$ $$ ►

► 00 ( !( ! 88 $$ $$ ►

► ( !( ! 88 $$ $$ ►

► >> !! 88 $$ $$

► 00 ## !! 88 $$ $$

► 44 $ ? ,$ ? , ( ( ►

► ++ %% ! ! 88 $$ $$

Referensi

Dokumen terkait

[r]

Pada tahun 2003 dalam rangka mendukung Program Pengelolaan Tanaman Terpadu (PTT) lokasi penelitian, difokuskan di Kabupaten Cilacap yang merupakan salah satu

2012), Pokja Jasa Konsultansi Unit Layanan Pengadaan Pemerintah Kota Pangkalpinang Tahun2. Anggaran 2012 telah melaksanakan salah satu kegiatan dalam proses seleksi umum

Penelitian ini bertujuan untuk mengetahui saluran pemasaran beras, besarnya margin pemasaran yang diperoleh setiap lembaga pemasaran pada masing-masing saluran

keragaman menunjukkan berbagai perlakuan konsentrasi agar-agar terhadap permen jelly tidak menunjukkan pengaruh yang nyata terhadap kesukaan permen jelly di mana

[r]

2015 , dimana Perusahan yang memasukkan penawaran hanya 1 (Satu) Perusahaan Maka sesuai perpres 54 tahun 2010 dan perubahan ke 4 yaitu Perpres nomor 4 tahun 2015 tentang

Untuk Tahun yang Berakhir pada Tanggal Tersebut (Disajikan dalam rupiah, kecuali dinyatakan lain). As of December 31, 2015 and for the Year